Software  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Malicious Threats, Malicious Computer Code, Malicious Logic, Joke Programs, Blended Threats, Malicious Software, Malicious Code, Mobile Malware
DEFINITION: Polymorphic malware is harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes ("morphs"), making it difficult to detect with anti-malware programs. Evolution of the malicious code can occur in a variety of ways such as filename changes, compression and encryption with variable keys.Although the appearance of the code in polymorphic malware  … 
Definition continues below.
Malware Reports
26 - 50 of 935 Matches Previous Page  |  Next Page
The Business Guide to Ransomware
sponsored by Datto
EBOOK: No matter how big or how small the organization, ransomware is a serious threat that needs to be prevented and addressed wherever possible. Start by familiarizing yourself with the different types and distribution methods of ransomware so you can learn how to prepare your business to avoid and recover from attacks.
Posted: 07 Oct 2016 | Published: 07 Oct 2016


What Are The Security Benefits of Using Thin Client Devices?
sponsored by Dell, Microsoft and Citrix
EGUIDE: Thin clients are useful endpoints for organizations that support VDI, because they provide and extra layer of protection from user-initiated security risks. In this e-guide, find out the security benefits of using thin client devices as part of your desktop virtualization strategy.
Posted: 05 Oct 2016 | Published: 04 Oct 2016

Dell, Microsoft and Citrix

SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You
sponsored by ThreatConnect
WHITE PAPER: Examine how you can enhance your SIEM tool with a cybersecurity platform to take control of the data chaos, gain a fuller understanding of threats, eliminate false positives, and form a proactive and intelligence-driven defense.
Posted: 05 Oct 2016 | Published: 30 Sep 2016


The Last Line of Defense Against the “Mega Breach”
sponsored by CrowdStrike
WHITE PAPER: The frequency of "mega breaches" continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. Learn how breaches could be prevented by deploying endpoint protection technology.
Posted: 05 Oct 2016 | Published: 30 Sep 2016


5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by IBM
EGUIDE: Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for handling ransomware attacks. You'll get expert advice on how to improve your network security strategy and defend against advanced malware threats.
Posted: 05 Oct 2016 | Published: 03 Oct 2016


Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID
WHITE PAPER: How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016


Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts
sponsored by Appthority
WHITE PAPER: This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.
Posted: 04 Oct 2016 | Published: 04 Oct 2016


Why Move to an MSSP?
sponsored by Trustwave
WHITE PAPER: Learn about the most common reasons for moving IT security functions to a hybrid or fully managed security services provider (MSSP) model. Discover the unique methods that an MSSP offers in overcoming several common security challenges ranging from tactical to strategic.
Posted: 04 Oct 2016 | Published: 31 Dec 2015


Ransomware — Anatomy of an Attack
sponsored by OpenDNS
VIDEO: Discover how an effective ransomware attack comes together in this short video based on every day events. Get inside the head of a modern day hacker and learn how they've turned a malicious hobby into a fruitful career.
Posted: 04 Oct 2016 | Premiered: 08 Sep 2016


Waste Less Time Fighting Ransomware Attacks
sponsored by OpenDNS
RESOURCE: Have you ever wanted to learn more about the infrastructure being used by a ransomware attack? Discover how to map out the internet infrastructure that attackers use to launch current and future attacks.
Posted: 30 Sep 2016 | Published: 31 Aug 2016


Cisco 2016 Midyear Cybersecurity Report
sponsored by OpenDNS
WHITE PAPER: The Cisco 2016 Midyear Cybersecurity Report provides insights for security professionals on the trends and developments affecting the security landscape for the last half of the year. Access now and go to page 45 in particular for a discussion on ransomware attacks on healthcare organizations.
Posted: 30 Sep 2016 | Published: 01 Jul 2016


Security Report: 2016 DDoS Attack Trends
sponsored by Akamai
WHITE PAPER: In this recent security report, discover where, when and how hard DDoS attacks are hitting across the globe and how you can avoid them. Leverage this data to better make more intelligent, strategic decisions on security.
Posted: 29 Sep 2016 | Published: 31 Aug 2016


Q2 2016 State of the Internet Security Report
sponsored by Akamai
WHITE PAPER: Discover how dire the world of DDoS security attacks has become and dig into the details of multi-vector attacks. Learn statistics on each industry that was attacked and get insight on how to best protect your network in the future.
Posted: 29 Sep 2016 | Published: 31 Aug 2016


DDoS Attack Stats & Trends
sponsored by Akamai
RESOURCE: The DDoS findings in this infographic suggest that attack tools grew more sophisticated in Q1 2016 and only look to increase in ferocity. Discover which industries were hit hardest by DDoS attacks in Q1 2016 and create a security strategy to avoid becoming a statistic in the next infographic.
Posted: 29 Sep 2016 | Published: 31 Aug 2016


Data Access Governance Solutions Demo
sponsored by STEALTHbits
PRODUCT DEMO: StealthAUDIT for DAG is an auditing, compliance, and governance framework for unstructured data and critical applications that provides comprehensive data collection, analysis, remediation workflows, and reporting. Click on the download now button to request a live demonstration of the Data Access Governance solutions.
Posted: 28 Sep 2016 | Premiered: 28 Sep 2016


The Rising Face of Cyber Crime Ransomware
sponsored by BitSight
WHITE PAPER: Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.
Posted: 28 Sep 2016 | Published: 31 Aug 2016


Recovering From Ransomware Starts with a Data Protection Strategy
sponsored by Dell Software
EGUIDE: Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

How to Protect Data from Ransomware
sponsored by Dell Software
WHITE PAPER: It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

Assess Your Open File Shares to Combat Security, Compliance Risk
sponsored by STEALTHbits
SOFTWARE DEMO: Even the best security is powerless in the face of a file share that nearly everyone has access to, especially one that contains sensitive data you didn't even know was out there. Discover inappropriate access before it's too late. Get an open share assessment and make sure your data is safe.
Posted: 27 Sep 2016 | Premiered: 31 Aug 2016


DDoS Attacks: Q2 2016 vs. Q2 2015
sponsored by Akamai
ANALYST REPORT: This security report shows you the cybersecurity and attack trends to the end of Q2 2016, specifically in regards to DDoS and web application attacks. Discover why there's been such a dramatic increase in DDoS and web application attacks.
Posted: 27 Sep 2016 | Published: 30 Apr 2016


Reeling in Ransomware Data Protection for You and Your Users
sponsored by Code42
WHITE PAPER: In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.
Posted: 26 Sep 2016 | Published: 26 Sep 2016


Cyber Threats to Online Shopping Cheer
sponsored by Neustar
WHITE PAPER: Learn how to protect your brand and stay online during high-volume occasions. See statistics on current online shopping trends and discover how to stop fraudulent actors before they can damage your organization.
Posted: 03 Oct 2016 | Published: 31 Dec 2016


2016 Security Operations Center Report
sponsored by Neustar
WHITE PAPER: This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.
Posted: 29 Sep 2016 | Published: 31 Aug 2016


2016 Neustar DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future holds for your organization and learn why security should be a central concern for all devices on your network.
Posted: 29 Sep 2016 | Published: 30 Apr 2016


Neustar DDOS Attacks & Protection Report: North America & EMEA The Continuous Risk to Digital Brands
sponsored by Neustar
WHITE PAPER: This report encapsulates the survey results of 760 CSOs, CIOs, CTOs and others in IT security. Its purpose is to learn how companies in North America and the EMEA region (Europe, the Middle East, and Africa) encounter and defend against DDoS attacks.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

26 - 50 of 935 Matches Previous Page    1 2 3 4 5    Next Page
MALWARE DEFINITION (continued): …  varies with each "mutation," the essential function usually remains the same. For example, a spyware program intended to act as a keylogger will continue to perform that function even though its signature changes. If the malicious program is discovered by an anti-malware vendor and its signature is added to a downloadable database, the anti-malware program will fail to detect the rogue code after the signature has changed, just as if a new virus, worm, Trojan or spyware program has emerged. In this way, malware creators gain an advantage over countermeasure developers.The best method … 
Malware definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement